You are on page 1of 4

1 a)

Explanation of silly window syndrome 2 Marks.

Solution is Nagle Algorithm

2) a)
a. The source port number is the first 16 bits or (0045) 16 = 69.
b. The destination port number is the second 16 bits (DF00)16 = 57,088.
c. The total length of the datagram is the third 16 bits (0058)16 = 88 bytes.
d. The length of the data is 88 8 = 80 bytes.
e. The message is from a server with a small (well-known) port number to a
client with a large (ephemeral) port number.
f. The well-known port number 69 belongs to TFTP.
g. The sender has not calculated the checksum for this packet because the
value of the checksum is all zeros.

2 b)

The following figure shows the states and events. The sender needs two states:
ready and blocking. The receiver also needs two states. To send a packet, the
sender should be in the ready state and receives data from the application
layer. When in the blocking state, if the sender gets a NAK, it resends the
packet and remains in the blocking state. When the sender receives an ACK, it
moves to the ready state and waits until data comes from the application layer.
When the receiver is in the ready state, it can accept a packet. If the packet is
corrupted, it sends a NAK and remains in that state.
2 C)

a. The text is 1000  8 = 8000 bits. This results in 80006 = 1333.33 or 1334
characters. We have 1334 1000 = 334 redundant bytes. The ratio of
redundant bytes to the entire message length is 334/1334  25%.
b. In this case, 900 + (100  3) = 1200 bytes are in the encoded message.
There are 200 redundant bytes. The ratio of redundant bytes to the entire
message length is 2001200  16.7%.
c. The efficiency in part a is (1000)/(1334) = 75%. The efficiency in part b is
(1000/1200) = 83%. The efficiency is improved 8%.

3 A)

The first thing you’ll surely want to do is register the domain name friend.com at a registrar. A
registrar is a commercial entity that verifies the uniqueness of the domain name, enters the
domain name into the DNS database.

When you register the domain name networkutopia.com with some registrar, you also need to
provide the registrar with the names and IP addresses of your primary and secondary
authoritative DNS servers. Suppose the names and IP addresses are dns1.students.com,
dns2.students.com, 212.212.212.1, and 212.212.212.2.
For each of these two authoritative DNS servers, the registrar would then make sure that a Type
NS and a Type A record are entered into the TLD com servers.
Specifically, for the primary authoritative server for networkutopia.com, the registrar would
insert the following two
resource records into the DNS system: (students.com, dns1.students.com, NS)
(dns1.students.com, 212.212.212.1, A)
You’ have to make sure that the Type A resource record for your Web server www.friend.com
and the Type MX resource record for your mail server mail.friend.com are entered into your
authoritative DNS servers.

for example, from a configuration file created by a system manager. More recently, an UPDATE
option has been added to the DNS protocol to allow data to be dynamically added or deleted
from the database via DNS messages. [RFC 2136] and [RFC
3007] specify DNS dynamic updates.)

Suppose you wants to view the Web page www.students.com. As discussed earlier, her host will
first send a DNS query to her local DNS server. The local DNS server will then contact a TLD
com server. (The local DNS server will also have to contact a root DNS server if the address of a
TLD com server is not cached.) This TLD server contains the Type NS and Type A resource
records listed above, because the registrar had these resource records inserted into all of the TLD
com servers. The TLD com server sends a reply to Alice’s local DNS server, with the reply
containing the two resource records. The local DNS server then sends a DNS query to
212.212.212.1, asking for the Type A record corresponding to www.friend.com. This record
provides
the IP address of the desired Web server, say, 212.212.71.4, which the local DNS server passes
back to your host. Your browser can now initiate a TCP connection to the host 212.212.71.4 and
send an HTTP request over the connection

3 B)

a. TCP slowstart is operating in the intervals [1,6] and [23,26]


b. TCP congestion advoidance is operating in the intervals [6,16] and [17,22]
c. After the 16th transmission round, packet loss is recognized by a triple duplicate ACK. If
there was a timeout, the congestion window size would have dropped to 1.
d. The threshold is initially 32, since it is at this window size that slowstart stops and
congestion avoidance begins.
e. The congestion window and threshold will be set to half the current value of the
congestion window (8) when the loss occurred. Thus the new values of the threshold and
window will be 4.
4 A)
The following figure shows the time line for each segment. Note that a mild
version of the silly window syndrome actually exists here. We have six segments
of which two each carry 10 bytes of data and the other four each carry
20 bytes of data. No segment carries the MSS. The reason is that acknowledgments are not delayed by the receiver:
each segment is acknowledged immediately.
4 B)

FTP control connection and data connection diagrams 3 marks

Commands used to send file and store at server side and server replying with response 7 Marks

You might also like